Friday, 10th July 2020
BLOG

Sensitive data discovery: before you can control and protect it, you need to know where it is

The consequences of sensitive data getting into the wrong hands can be significant, and a considerable source of risk and anxiety for organisations. But a bigger problem logistically can be determining where such data exists across the business, so companies can implement protective measures. James Paton, CEO of SynApps Solutions, explains.

Read More

BLOG

Cybersecurity in a digitalised world

As our world becomes increasingly interconnected, businesses and individuals are realising benefits they could once only dream of. Thanks to this digital revolution, our critical infrastructure can be operated with increased efficiency and reliability, helping to provide consumers with the services they demand and businesses with more insight into their operations. However, as we come to rely much more upon digital technologies, there will be a shift in the types of risk we face. By David Syl...

Read More

BLOG

How backup and recovery can help with GDPR compliance

According to the recently-published DLA Piper GDPR Data Breach Survey 2020, more than 160,000 data breach notifications have been reported across Europe since the General Data Protection Regulation (GDPR) came into force in May 2018. The survey also found that data protection regulators have imposed €114 million in fines under the GDPR regime for a wide range of GDPR infringements. It is clear therefore that that many businesses are still facing challenges when it comes to meeting and maintainin...

Read More

BLOG

SASE: The difference between a transit cloud and a destination cloud

Modern businesses are under pressure to deliver when it comes to the experience, they offer their employees and customers when accessing applications in the cloud. Digital-savvy users expect seamless and consistent access to applications and services, regardless of where they are connecting or which device they use. While the emergence of the internet as the new corporate network has myriad benefits for all concerned, it requires a fundamental overhaul of traditional network security. By Nat...

Read More

BLOG

Service providers on the edge

Common automation frameworks and the end of speed and security compromises. By Bart Salaets, Senior Solution Architect Director, F5 Networks.

Read More

BLOG

With 5G and IoT, it’s a new day with new risks

Connectivity as a concept has become an essential part of life, as opposed to just a luxury. The Internet of Things (IoT) has already become commonplace in our lives, thanks to all the connected devices and smart technologies we own, interacting with one another to create a fully connected network. With the global number of IoT devices projected to triple by 2025 and 5G technologies very soon to become a cohesive part of the UK’s telecoms infrastructure, as a country we will soon be more connect...

Read More

Latest Video

Case Study: @nifty Delivering IT Security to Their Customers with Kaspersky

NIFTY Corporation is one of the leading Telecoms and Internet Service Providers in Japan, supplying high-speed broadband connectivity to more than 1.39 million broadband users. Providing robust security for the many subscribers to its online services is very important because repeated security breaches or loss of service may result in customers suffering damage or losses - and ultimately leaving NIFTY and moving to competitors' services.

Read more